首页期刊导航|Computer science review
期刊信息/Journal information
Computer science review
Elsevier
Computer science review

Elsevier

季刊

1574-0137

Computer science review/Journal Computer science reviewEIESCISCI
正式出版
收录年代

    Integrating Explainable AI with Federated Learning for Next-Generation IoT: A comprehensive review and prospective insights

    Dubey, PraveerKumar, Mohit
    1.1-1.42页
    查看更多>>摘要:The emergence of the Internet of Things (IoT) signifies a transformative wave of innovation, establishing a network of devices designed to enrich everyday experiences. Developing intelligent and secure IoT applications without compromising user privacy and the transparency of model decisions causes a significant challenge. Federated Learning (FL) serves as a innovative solution, encouraging collaborative learning across a wide range of devices and ensures the protection of user data and builds trust in the process. However, challenges remain, including data variability, potential security vulnerabilities within FL, and the necessity for transparency in decentralized models. Moreover, the lack of clarity associated with traditional AI models raises issues regarding transparency, trust and fairness in IoT applications. The survey examines the integration of Explainable AI (XAI) and FL within the Next Generation IoT framework. It provides a thorough analysis of how XAI techniques can elucidate the mechanisms of FL models, addressing challenges such as communication overhead, data heterogeneity and privacy-preserving explanation methods. The survey brings attention to the benefits of FL, including secure data sharing, effective modeling of heterogeneous data and improved communication and interoperability. Additionally, it presents mathematical formulations of the challenges in FL and discusses potential solutions aimed at enhancing the resilience and scalability of IoT implementations. Eventually, convergence of XAI and FL enhances interpretability and promotes the development of trustworthy and transparent AI systems, establishing a strong foundation for impactful applications in the ever evolving Next-Generation IoT landscape.

    Cloud continuum testbeds and next-generation ICTs: Trends, challenges, and perspectives

    Casino, FranLopez-Iturri, PeioPatsakis, Constantinos
    1.1-1.21页
    查看更多>>摘要:As society's dependence on Information and Communication Technologies (ICTs) grows, providing efficient and resourceful services entails many complexities that require, among others, scalable systems that are provided with intelligent and automated management. In parallel, the different components of cloud computing are continuously evolving to enhance their capabilities towards leveraging the next generation of ICTs. Due to the substantial investment in resources required to provide efficient services, suitable research and experimentation platforms to test and validate cloud technologies before releasing them into operational versions are crucial to delivering sound systems with sustainable cost/benefit ratios. In this article, we review the current state of the art by analysing cloud testbeds devoted to studying the capabilities of the cloud continuum. Instead of recalling a component-wise or architectural discussion of these systems, this article explores the full spectrum of the cloud continuum testbeds and their features, providing a taxonomy that can be practically used as an entry point to identify each testbed's scope. Moreover, we extract the challenges found in the literature to deliver a profound discussion, correlating the analysed testbeds and their features. Our findings highlight the main gaps and potential roadmaps to provide effective testbeds considering the next generation of ICTs.

    WebAssembly and security: A review

    Perrone, GaetanoRomano, Simon Pietro
    1.1-1.23页
    查看更多>>摘要:WebAssembly is revolutionizing the approach to developing modern applications. Although this technology was born to create portable and performant modules in web browsers, currently, its capabilities are extensively exploited in multiple and heterogeneous use-case scenarios. With the extensive effort of the community, new toolkits make the use of this technology more suitable for real-world applications. In this context, it is crucial to study the liaisons between the WebAssembly ecosystem and software security. Indeed, WebAssembly can be a medium for improving the security of a system, but it can also be exploited to evade detection systems or for performing crypto-mining activities. In addition, programs developed in low-level languages such as C can be compiled in WebAssembly binaries, and it is interesting to evaluate the security impacts of executing programs vulnerable to attacks against memory in the WebAssembly sandboxed environment. Also, WebAssembly has been designed to provide a secure and isolated environment, but such capabilities should be assessed in order to analyze their weaknesses and propose new mechanisms for addressing them. Although some research works have provided surveys of the most relevant solutions aimed at discovering WebAssembly vulnerabilities or detecting attacks, at the time of writing there is no comprehensive review of security-related literature in the WebAssembly ecosystem. We aim to fill this gap by proposing a comprehensive review of research works dealing with security in WebAssembly. We analyze 147 papers by identifying seven different security categories. We hope that our work will provide insights into the complex landscape of WebAssembly and guide researchers, developers, and security professionals towards novel avenues in the realm of the WebAssembly ecosystem.

    A comprehensive survey of golden jacal optimization and its applications

    Hosseinzadeh, MehdiTanveer, JawadRahmani, Amir MasoudAlanazi, Abed...
    1.1-1.38页
    查看更多>>摘要:In recent decades, there has been an increasing interest from the research community in various scientific and engineering fields, including robotic control, signal processing, image processing, feature selection, classification, clustering, and other issues. Many optimization problems are inherently complicated and complex. They cannot be solved by traditional optimization methods, such as mathematical programming, because most conventional optimization methods focus on evaluating first derivatives. On the other hand, metaheuristic algorithms have high ability and adaptability in finding near-optimal solutions in a reasonable time for different optimization problems due to parallel search and balance between exploration and exploitation. This study discusses the basic principles and mechanisms of the GJO algorithm and its challenges. This review aims to provide valuable insights into the potential of the GJO algorithm for real-world and scientific optimization tasks. In this paper, a complete review of the Golden Jackal Optimization (GJO) algorithm for various optimization problems is done. The GJO algorithm is one of the metaheuristic algorithms invented in 2022 and inspired by the life of natural jackals. This paper's complete classification of GJO in hybrid, improved, binary, multi-objective, and optimization problems is done. The analysis shows that the percentage of studies conducted in the four fields of hybrid, improved variants of GJO (binary, multi-objective), and optimization are 11 %, 44 %, 9 %, and 36 %, respectively. Studies have shown that this algorithm performs well in real-world challenges. GJO is a powerful tool for solving scientific and engineering problems flexibly.

    Artificial hummingbird algorithm: Theory, variants, analysis, applications, and performance evaluation

    Sasmal, BuddhadevDas, ArunitaDhal, Krishna GopalSaha, Ramesh...
    1.1-1.54页
    查看更多>>摘要:The Artificial Hummingbird Algorithm (AHA) is a metaheuristic optimization technique inspired by the behaviours and foraging strategies of hummingbirds. Known for their extraordinary agility and accuracy in collecting nectar, hummingbirds provide an exemplary framework for tackling complex optimization problems. Developed by Zhao et al. in 2022, AHA has swiftly attracted interest within the research community because to its exceptional performance and adaptability. This study provides a detailed and comprehensive review of AHA, exploring the diverse versions and modifications published in multiple research papers since its inception in 2022, with 23 % appearing in international conference papers and 75% in esteemed peer-reviewed journals. The variants of AHA covered in this paper include 55 % of classical AHA, 17 % of improved AHA, 11 % of hybridization, 2 % of binary, 15 % of multi-objective variants, respectively. Furthermore, the applications of AHA illustrate its effectiveness and adaptability across various fields, with 42 % in power and control engineering, 11 % in optimizing deep learning models, 10 % in engineering design challenges, and 8 % in renewable energy sources. The algorithm has been utilized substantially in the domain of IoT, wireless sensor networks, wind energy, and fog computing. Furthermore, we also evaluate the performance of the AHA in the image clustering domain, and the findings revealed that the AHA performs better in comparison to the other tested methods. The main objectives of this study are to deliver a comprehensive review of AHA, emphasizing its novel methodology, and analyzing its various variants and their applications in numerous fields. As nature-inspired optimization methods continue to evolve, this survey paper expected to serves as a valuable resource for researchers aiming to gain a comprehensive understanding of AHA, its progression, and its diverse applications in solving complex optimization problems.

    A comprehensive review of usage control frameworks

    Akaichi, InesKirrane, Sabrina
    1.1-1.22页
    查看更多>>摘要:The sharing of data and digital assets in a decentralized settling is entangled with various legislative challenges, including, but not limited to, the need to adhere to legal requirements with respect to privacy and copyright. In order to provide more control to data and digital asset owners, usage control could be used to make sure that consumers handle data according to privacy, licenses, regulatory requirements, among others. However, considering that many of the existing usage control frameworks were designed to cater for different use cases (e.g., networking, operating systems, and industry 4.0), there is a need to better understand the existing proposals and how they compare to one another. In this paper, we provide a holistic overview of existing usage control frameworks and their support for a broad set of requirements. We systematically collect requirements that are routinely used to guide the development of usage control solutions, which are classified according to three broad dimensions: specification, enforcement, and system. We use these requirements to conduct a qualitative comparison of the most prominent usage control frameworks found in the literature. Finally, we identify existing gaps, challenges, and opportunities in the field of usage control in general, and in decentralized environments in particular.

    Advancing smart transportation: A review of computer vision and photogrammetry in learning-based dimensional road pavement defect detection

    Tafida, AdamuAlaloul, Wesam SalahZawawi, Noor Amila Bt WanMusarat, Muhammad Ali...
    1.1-1.15页
    查看更多>>摘要:Road infrastructure networks are crucial in facilitating smart mobility, as indicated by the emergence of innovative transportation concepts that offer improved efficiency and environmental sustainability. This study seeks to review the literature regarding road pavement condition assessment performance improvement tools which utilize various computer vision and photogrammetry tools aided by machine learning algorithms towards mitigating challenges encountered and promoting smart transportation trends. A comprehensive search of available literature was conducted, and relevant studies were analyzed to identify computer vision and photogrammetry tools used, learning-based algorithms deployed and contribution to the improvement of road infrastructure to aid smart transportation. The review considered emerging challenges of the techniques, identified research gaps and explored the potentials of the techniques as it relates to aiding wider acceptance of the implementation of autonomous vehicles and smart transportation The study found gaps in knowledge relating to the computer vision (CV) and photogrammetry tools standardization of evaluation parameters, the applicability of the models for real-time assessment and implications regarding the adoption of autonomous vehicles and smart transportation which were not sufficiently considered in the previous cited literature. Future research areas were highlighted and its implication regarding the promotion of smart transportation.

    Artificial intelligence based classification for waste management: A survey based on taxonomy, classification & future direction

    Yevle, Dhanashree VipulMann, Palvinder Singh
    1.1-1.30页
    查看更多>>摘要:Waste management has grown to become one of the leading global challenges due to the massive generation of thousands of tons of waste that is produced daily, leading to severe environmental degradation, the risk of public health, and resource depletion. Despite efforts directed towards solving these problems, traditional methods of sorting and categorizing waste are inefficient and unsustainable, thus requiring the conceptualization of innovative AI-based solutions for more effective waste management. This review presents, a comprehensive review of all the strategies which are critical for AI based techniques, thus improve productivity and sustainability in operations. Diverse datasets used to train AI models along with performance evaluation metrics, and discusses challenges of AI assimilation in waste management systems, most fundamentally the issue of data privacy and concern of bias in the algorithms. Additionally, the role of loss functions and optimizers in enhancing AI model performance and suggests future research opportunities for sustainable resource recovery, recycling, and reuse based on AI.

    The emergence of artificial intelligence in autism spectrum disorder research: A review of neuro imaging and behavioral applications

    Devi, K. B. IndraVincent, P. M. Durai Raj
    1.1-1.40页
    查看更多>>摘要:The quest to find reliable biomarkers in autism spectrum disorders (ASD) is an ongoing endeavour to identify both underlying causes and measurable indicators of this neurodevelopmental condition. Machine learning (ML) and advanced deep learning (DL) techniques have enhanced biomarker identification in neuroimaging and behavioral studies, aiding in diagnostic accuracy and early detection. This review paper examines the transformative impact of applying machine learning (ML), particularly deep learning (DL) techniques such as transfer learning and transformer architectures, in advancing ASD diagnosis. The review begins by critically assessing existing literature utilizing ML techniques like logistic regression, random forest, and support vector machines in identifying biomarkers that could potentially aid in the diagnosis of ASD and differentiate between ASD and neurotypical individuals. The focus then shifts to DL models, including Multilayer Perceptrons, Convolutional Neural Networks, Graph Neural Networks, and Long Short-Term Memory networks, to evaluate their suitability for identifying complex patterns linked to ASD. Addressing limited datasets, the review examines transfer learning with pre-trained models, including VGG, ResNet, DenseNet, MobileNet, Inception, and Xception architectures. Additionally, using the ABIDE-I dataset, VGG19, MobileNet, InceptionV3, and DenseNet121 were applied, evaluating their performance through accuracy, sensitivity, specificity, and F1 score. The review further considers transformer architectures, such as Vision Transformers, Swin Transformers, Spatial Temporal Transformers, BolT Transformer, and Convolutional Network Transformer for capturing longrange dependencies in ASD diagnosis. This review aims to be an essential reference for researchers exploring the field of AI-powered ASD diagnosis and classification, by offering analysis of various approaches and highlighting recent advancements.

    Advances in attention mechanisms for medical image segmentation

    Zhang, JianpengChen, XiaominYang, BingGuan, Qingbiao...
    1.1-1.18页
    查看更多>>摘要:Medical image segmentation plays an important role in computer-aided diagnosis. Attention mechanisms that distinguish important parts from irrelevant parts have been widely used in medical image segmentation tasks. This paper systematically reviews the basic principles of attention mechanisms and their applications in medical image segmentation. First, we review the basic concepts of attention mechanism and formulation. Second, we surveyed about 200 articles related to medical image segmentation, and divided them into three groups based on their attention mechanisms, Pre-Transformer attention, Transformer attention and Mamba-related attention. In each group, we deeply analyze the attention mechanisms from three aspects based on the current literature work, i.e., the principle of the mechanism (what to use), implementation methods (how to use), and application tasks (where to use). We also thoroughly analyzed the advantages and limitations of their applications to different tasks. Finally, we summarize the current state of research and shortcomings in the field, and discuss the potential challenges in the future, including task specificity, robustness, standard evaluation, etc. We hope that this review can showcase the overall research context of traditional, Transformer and Mamba attention methods, provide a clear reference for subsequent research, and inspire more advanced attention research, not only in medical image segmentation, but also in other image analysis scenarios. Finally, we maintain the paper list and open-source code at here.